Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2017-5135

Description

Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.

POC

Reference

- https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/lnick2023/nicenice

- https://github.com/nixawk/labs

- https://github.com/oneplus-x/MS17-010

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/readloud/Awesome-Stars

- https://github.com/stringbleed/stringbleed.github.io

- https://github.com/stringbleed/tools

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/xbl2022/awesome-hacking-lists

- https://github.com/xbl3/awesome-cve-poc_qazbnm456